New Linux botnet SSHStalker uses IRC for command-and-control

Researchers have identified a new Linux botnet called SSHStalker that relies on the outdated IRC protocol for its command-and-control operations. The botnet spreads through SSH scanning and brute-forcing, targeting cloud infrastructure. It incorporates old vulnerabilities and persistence mechanisms for broad infection.

The SSHStalker botnet, documented by threat intelligence firm Flare, operates using the Internet Relay Chat (IRC) protocol, originally developed in 1988 and popular in the 1990s for text-based messaging. This choice emphasizes simplicity, low bandwidth, and resilience through multiple C-based bots and redundant servers and channels, rather than advanced stealth techniques.

Initial infection occurs via a Go-based tool disguised as the nmap network scanner, which performs noisy SSH scans and brute-force attacks. Once inside a host, the malware uses the compromised system to scan for more targets, enabling worm-like propagation. Flare analyzed a file containing results from nearly 7,000 scans conducted in January, primarily aimed at Oracle Cloud infrastructure.

After gaining access, SSHStalker downloads the GCC compiler to build payloads directly on the victim machine, enhancing portability. It then deploys C-coded IRC bots with predefined command-and-control servers and channels to integrate the host into the network. Additional components from archives named GS and bootbou handle orchestration.

Persistence is maintained through cron jobs running every 60 seconds, acting as a watchdog to restart the main process if terminated. For privilege escalation, the botnet exploits 16 common vulnerabilities and exposures (CVEs) from Linux kernels dated 2009-2010, following initial low-privilege entry.

Monetization features include harvesting AWS keys, scanning websites, and deploying the PhoenixMiner for Ethereum cryptomining. DDoS tools are built-in but unused so far; bots typically connect to C2 servers and remain idle, indicating possible testing or resource stockpiling.

Flare notes resemblances to the Outlaw/Maxlas botnet family and Romanian-linked indicators but has not tied it to a specific group. To counter it, the firm advises monitoring for compiler activity, IRC outbound traffic, and frequent cron jobs. Defensive steps include disabling SSH password logins, removing compilers from production environments, applying egress filters, and blocking execution in /dev/shm.

相关文章

Dramatic server room scene illustrating the SSHStalker Linux botnet infecting thousands of vulnerable servers via SSH exploits.
AI 生成的图像

Researchers discover SSHStalker botnet infecting Linux servers

由 AI 报道 AI 生成的图像

Flare researchers have identified a new Linux botnet called SSHStalker that has compromised around 7,000 systems using outdated exploits and SSH scanning. The botnet employs IRC for command-and-control while maintaining dormant persistence without immediate malicious activities like DDoS or cryptomining. It targets legacy Linux kernels, highlighting risks in neglected infrastructure.

A new Linux botnet named SSHStalker is exploiting cloud servers for profit by employing the ancient IRC protocol. It targets Linux servers through automated scans, cron jobs, and IRC communications. The operation revives old-school methods to cut costs, as reported by TechRadar.

由 AI 报道

A Go-based botnet known as GoBruteforcer is scanning and compromising Linux servers globally by brute-forcing weak passwords on exposed services like FTP, MySQL, and PostgreSQL. Check Point Research has identified a 2025 variant that has infected tens of thousands of machines, putting over 50,000 internet-facing servers at risk. The attacks exploit common defaults from AI-generated configurations and legacy setups.

Ten typosquatted npm packages, uploaded on July 4, 2025, have been found downloading an infostealer that targets sensitive data across Windows, Linux, and macOS systems. These packages, mimicking popular libraries, evaded detection through multiple obfuscation layers and amassed nearly 10,000 downloads. Cybersecurity firm Socket reported the threat, noting the packages remain available in the registry.

由 AI 报道

Researchers at LevelBlue have identified a new variant of the SysUpdate malware aimed at Linux systems during a digital forensics and incident response engagement. The malware disguises itself as a legitimate system service and employs advanced encryption for command-and-control communications. By reverse-engineering it, the team created tools to decrypt its traffic more quickly.

Cisco Talos has reported a China-linked threat actor known as UAT-7290 that has been spying on telecommunications companies since 2022. The group uses Linux malware, exploits on edge devices, and ORB infrastructure to maintain access to targeted networks.

由 AI 报道

Russian state-sponsored hackers quickly weaponized a newly patched Microsoft Office flaw to target organizations in nine countries. The group, known as APT28, used spear-phishing emails to install stealthy backdoors in diplomatic, defense, and transport entities. Security researchers at Trellix attributed the attacks with high confidence to this notorious cyber espionage unit.

 

 

 

此网站使用 cookie

我们使用 cookie 进行分析以改进我们的网站。阅读我们的 隐私政策 以获取更多信息。
拒绝